Sciweavers

1688 search results - page 80 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
VLDB
2002
ACM
108views Database» more  VLDB 2002»
15 years 4 months ago
Energy-performance trade-offs for spatial access methods on memory-resident data
Abstract. The proliferation of mobile and pervasive computing devices has brought energy constraints into the limelight. Energy-conscious design is important at all levels of syste...
Ning An, Sudhanva Gurumurthi, Anand Sivasubramania...
VL
2002
IEEE
124views Visual Languages» more  VL 2002»
15 years 9 months ago
Supporting the Construction of Real World Interfaces
In recent years, real world objects have been used to reflect information previously shown on the computer screen. While most earlier efforts have required significant developer...
D. Scott McCrickard, David Wrighton, Dillon Busser...
VLDB
2001
ACM
109views Database» more  VLDB 2001»
15 years 9 months ago
Analyzing energy behavior of spatial access methods for memory-resident data
The proliferation of mobile and pervasive computing devices has brought energy constraints into the limelight, together with performance considerations. Energy-conscious design is...
Ning An, Anand Sivasubramaniam, Narayanan Vijaykri...
SACMAT
2009
ACM
15 years 11 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
SIGUCCS
2000
ACM
15 years 8 months ago
From VTs to iMacs: Moving Public Computing Access into the 21st Century
In a Collegiate setting, technology must be functional, effective, and highly visible. In the fall of 1999 the CIS department at Bowdoin College saw the need for a greater number ...
Robert Denton, Patrick Jensen